Sciweavers

537 search results - page 16 / 108
» Comparative Study of Protocols Used for Establishing VPN
Sort
View
P2P
2006
IEEE
153views Communications» more  P2P 2006»
15 years 3 months ago
Internet-Scale Storage Systems under Churn -- A Study of the Steady-State using Markov Models
Content storage in a distributed collaborative environment uses redundancy for better resilience and thus provides good availability and durability. In a peer-to-peer environment,...
Anwitaman Datta, Karl Aberer
NAACL
2003
14 years 11 months ago
Evaluating the Evaluation: A Case Study Using the TREC 2002 Question Answering Track
Evaluating competing technologies on a common problem set is a powerful way to improve the state of the art and hasten technology transfer. Yet poorly designed evaluations can was...
Ellen M. Voorhees
FMSD
2006
103views more  FMSD 2006»
14 years 9 months ago
Cones and foci: A mechanical framework for protocol verification
We define a cones and foci proof method, which rephrases the question whether two system specifications are branching bisimilar in terms of proof obligations on relations between ...
Wan Fokkink, Jun Pang, Jaco van de Pol
MONET
2008
153views more  MONET 2008»
14 years 9 months ago
Comparison of MANET Routing Protocols Using a Scaled Indoor Wireless Grid
Predicting the performance of ad-hoc networking protocols has typically been performed by making use of software based simulation tools. Experimental study and validation of such p...
David Johnson, Albert Lysko
WWW
2008
ACM
15 years 10 months ago
A comparative analysis of web and peer-to-peer traffic
Peer-to-Peer (P2P) applications continue to grow in popularity, and have reportedly overtaken Web applications as the single largest contributor to Internet traffic. Using traces ...
Naimul Basher, Aniket Mahanti, Anirban Mahanti, Ca...